Results 51 to 60 of about 1,901,421 (313)

On Some Cryptographic Protocol

open access: yesSchedae Informaticae, 2021
In this paper we present a cryptographic protocol for a seller - buyer problem and in particular we prove that non-emptiness of a semi-commutative set defined by mappings involved in the protocol is a decidable problem.
openaire   +3 more sources

Abstracting cryptographic protocols with tree automata [PDF]

open access: yesScience of Computer Programming, 1999
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
David Monniaux, David Monniaux
openaire   +3 more sources

Automated Cryptographic Analysis of the Pedersen Commitment Scheme

open access: yes, 2017
Aiming for strong security assurance, recently there has been an increasing interest in formal verification of cryptographic constructions. This paper presents a mechanised formal verification of the popular Pedersen commitment protocol, proving its ...
Dong, Changyu, Metere, Roberto
core   +1 more source

Formal Verification of Security Protocol Implementations: A Survey [PDF]

open access: yes, 2014
Automated formal verification of security protocols has been mostly focused on analyzing high-level abstract models which, however, are significantly different from real protocol implementations written in programming languages.
A Bauer   +27 more
core   +2 more sources

The Practice of Cryptographic Protocol Verification

open access: yesElectronic Notes in Theoretical Computer Science, 2003
We analyze the complexity of verifying security protocols for finite ...
openaire   +3 more sources

Post Quantum Cryptography from Mutant Prime Knots

open access: yes, 2010
By resorting to basic features of topological knot theory we propose a (classical) cryptographic protocol based on the `difficulty' of decomposing complex knots generated as connected sums of prime knots and their mutants.
Adams C.   +13 more
core   +1 more source

Cryptographic protocols with everyday objects [PDF]

open access: yesFormal Aspects of Computing, 2014
Abstract Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are ...
Heather, J, Schneider, S, Teague, V
openaire   +4 more sources

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerif

open access: yesIEEE Access
The formal verification of cryptographic protocols has been extensively studied in recent years. To verify the cryptographic protocol security, formal verification tools consider protocol properties as interactive processes involving a cryptographic ...
Takehiko Mieno   +3 more
doaj   +1 more source

An Improved Key Agreement Protocol Based on Fractal Theory [PDF]

open access: yesEngineering and Technology Journal, 2014
A key agreement protocol is a key establishment technique which enables two or more communicating parities to agree on a key or exchange information over an open communication channel.
Nadia M. G. Al-Saidi
doaj   +1 more source

Home - About - Disclaimer - Privacy